Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP. Zhenhua Li Chunjing Han Gaogang Xie

Size: px
Start display at page:

Download "Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP. Zhenhua Li Chunjing Han Gaogang Xie"

Transcription

1 Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP Zhenyu Li Donghui Yang Zhenhua Li Chunjing Han Gaogang Xie

2 Continuous increase of mobile data CISCO projected: the mobile data will increase7-fold by 2021 The increase is largely due to rich content being available Video traffic will be 78% by 2021 The Internet is indeed a content network Content request Data / content PAM 2018, Berlin 2

3 Content hosting and delivery service outsourcing content delivery Cloud Questions: network footprint? traffic locality? 3

4 Why China? The largest Internet in a single country Over 800 million video users unique local regulations and network policies Network is planned: very few ASes seen outside The ICP regulation: Akamai could not deploy replica servers in mainland China Heavily censored visible web access. How about invisible web access (a.k.a trackers)? Google is not accessible, but how about doubleclick? 4

5 Passive DNS Data timestamp, domain name, response IP list LDNS Logs were collected from all recursive DNS resolvers of a major Chinese cellular ISP 2 days, ~55 billion logs Response IP list: ~50% one single IP The first one was taken as the one that the hostname was mapped to PAM 2018, Berlin 5

6 Passive DNS Data Data Preprocessing IP to ASN using Team Cymru Aggregation IPs to /24 prefix FQDN (Full Qualified Domain Names) to their second level domains (SLDs) to save analysis time Invisible web access: identification of tracking domains using Easylist + EasylistChina. Ethical issues No personal ID (client IP addresses are not available) Such datasets are maintained by ISPs for maintenance purpose PAM 2018, Berlin 6

7 Metrics CDP: content delivery potential Fraction of domains that an AS can serve CMI: content monopoly index the extent to which an AS hosts content that others do not have AS1 AS2 CDP=4/6 CMI=1/4*(1/2+1+1/2+1/2)=5/8 AS3 S i : # of domains that can be served by this AS m j : # of ASes that can serve this domain CDP=2/6 CMI=1/2*(1+1)=1 Ager, B., Muhlbauer, W., Smaragdakis, G., Uhlig, PAM 2018, S.: Web Berlin content cartography, ACM IMC (2011) 7

8 Content Hosting Analysis PAM 2018, Berlin 8

9 A look at the top ASes Observations Biased distribution: top 2 accounting for 2/3 ISPs dominate: not CDNs /cloud Good locality: ~70% queries resolved to IPs of the examined ISP Possible reasons ISPs provide IDC or even servers to CDNs for content replication Only ISPs and some giant enterprises have their own ASes in China PAM 2018, ISP Berlin is the one where we obtained data 9

10 CDP of Top ASes: popular domains The examined ISP 0.95 Apple Popular content is well replicated into the examined cellular ISPs Good for performance Apple AS: low CDP, but higher rank in terms of requests Host of its own services that are frequently requested (by smart devices) PAM 2018, Berlin 10

11 CDP of Top ASes: all domains Alibaba cloud ISP ISP Chinanet backbone Tencent Cloud CDP values for all ASes are relatively low (<0.06) Because of huge volume of non-popular domains The rise of cloud Cloud platforms provide easy-to-use hosting services for individuals 11

12 Content similarity between ASes Cosine Similarity One vector for each AS: an element is <domain name, # of queries> Chinanet: giant network Cloud very low similarity (hosting nonpopular sites) The examined ISP Low similarity: high content availability Exception: Akamai ASes (#12 and #13) ü caused by the domain aggregation? 12

13 CMI of Top ASes Top 10k domains low CMI values for all ASes All domains Very high for the two cloud platforms Moderately high for Chinanet s ASes PAM 2018, Berlin 13

14 On Content Providers Questions: who deployed the replicas into the cellular ISP? How about their network footprints? Identification of major providers WhoIs utility: not accurate Last CNAME: not available spectrum clustering on the bipartite graph Intuition: a provider uses a set of IP prefixes to serve same sites è clustering /24 IP prefix Domain Weighted by the # of queries seen IP prefixes 14

15 On Content Providers 15 out of 900+ clusters account for ~50% query volume Giant players in mobile Internet dominate, e.g. Baidu, Alibaba, and Tencent Mixed: may contain one or more CDNs 4 Tencent clusters provide 4 different services 15

16 (Invisible web) tracker hosting infrastructure PAM 2018, Berlin 16

17 A look at trackers Only 2 trackers are based in China a potential cyber-security vulnerability Trackers are well-replicated into several networks 17

18 Tracking server Bimodal distribution: either seldom used by tracking service, or exclusively for trackers Monitoring traffic goes to the servers that are exclusively for trackers could provide insights into trackers usage PAM 2018, Berlin 18

19 Tracking from the net perspective Trackers have also been replicated into the examined cellular network, but still 20% goes abroad Low CDP, low CMI trackers are replicated into several ASes, and each AS hosts very few 19

20 Summary One of the first studies on content hosting infrastructure in cellular network fromthe Chinese perspective Finding 1: great traffic localityin the examined ISP network Finding 2: raise of cloud platforms Finding 3: most of the popular trackers are non-china based Methodology: clustering over bipartite graph to infer providers On-going work Data: One ISP è all major ISPs, with CNAME being available Vision: an up-to-date picture of the content hosting infrastructure in China 20

21 Thanks PAM 2018, Berlin 21

Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP

Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP Zhenyu Li 1,2, Donghui Yang 1,2, Zhenhua Li 3, Chunjing Han 1,2, and Gaogang Xie 1,2 1 Institute of Comp. Tech, Chinese Academy

More information

Web Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig

Web Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Web Content Cartography Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Cartography Cartography (from Greek Χάρτης, chartes or charax = sheet of papyrus (paper)

More information

The forces behind the changing Internet: IXPs and content delivery and SDN

The forces behind the changing Internet: IXPs and content delivery and SDN The forces behind the changing Internet: IXPs and content delivery and SDN Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk http://www.eecs.qmul.ac.uk/~steve/ Credit to collaborators:

More information

A content delivery perspective on mobility in the Internet

A content delivery perspective on mobility in the Internet A content delivery perspective on mobility in the Internet Prof. Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk Credit to collaborators: Bernhard Ager, Anja Feldmann, Benjamin Frank,

More information

Back-Office Web Traffic on the Internet. IMC 2014 Vancouver, BC, CANADA November 5-7, 2014

Back-Office Web Traffic on the Internet. IMC 2014 Vancouver, BC, CANADA November 5-7, 2014 Back-Office Web Traffic on the Internet Enric Pujol Philipp Richter Balakrishnan Chandrasekaran Georgios Smaragdakis Anja Feldmann Bruce Maggs Keung- Chi Ng TU- Berlin TU- Berlin Duke University MIT /

More information

New levels of cooperation between eyeball ISPs and OTT/CDNs. RIPE 75 Dubai Oct 24, 2017 Falk von Bornstaedt, DTAG ICSS

New levels of cooperation between eyeball ISPs and OTT/CDNs. RIPE 75 Dubai Oct 24, 2017 Falk von Bornstaedt, DTAG ICSS New levels of cooperation between eyeball ISPs and OTT/CDNs. RIPE 75 Dubai Oct 24, 2017 Falk von Bornstaedt, DTAG ICSS 1 LACK OF TRANSPARENCY IMPAIRS internet performance Appl e Traffic Generators Clouds

More information

Detecting Malicious Activity with DNS Backscatter Kensuke Fukuda John Heidemann Proc. of ACM IMC '15, pp , 2015.

Detecting Malicious Activity with DNS Backscatter Kensuke Fukuda John Heidemann Proc. of ACM IMC '15, pp , 2015. Detecting Malicious Activity with DNS Backscatter Kensuke Fukuda John Heidemann Proc. of ACM IMC '15, pp. 197-210, 2015. Presented by Xintong Wang and Han Zhang Challenges in Network Monitoring Need a

More information

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010 How Akamai delivers your packets - the insight Christian Kaufmann SwiNOG #21 11th Nov 2010 What is a Content Distribution Network? The RFCs and Internet Drafts define a Content Distribution Network, CDN,

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

End-user mapping: Next-Generation Request Routing for Content Delivery

End-user mapping: Next-Generation Request Routing for Content Delivery Introduction End-user mapping: Next-Generation Request Routing for Content Delivery Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres ACM SIGCOMM Computer Communication Review. Vol. 45. No. 4. ACM, 2015

More information

Measuring the IPv6 Internet by active DNS and HTTP measurements (work in progress)

Measuring the IPv6 Internet by active DNS and HTTP measurements (work in progress) Measuring the IPv6 Internet by active DNS and HTTP measurements (work in progress) emile.aben@ripe.net Early 21st centry http://www.ripe.net 1 The 2 Internets The IPv4 Internet The IPv6 Internet How are

More information

Complex Interactions in Content Distribution Ecosystem and QoE

Complex Interactions in Content Distribution Ecosystem and QoE Complex Interactions in Content Distribution Ecosystem and QoE Zhi-Li Zhang Qwest Chair Professor & Distinguished McKnight University Professor Dept. of Computer Science & Eng., University of Minnesota

More information

John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante

John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS http://aqualab.cs.northwestern.edu ! DNS designed to map names to addresses Evolved into a large-scale distributed system!

More information

An Overview of PQC Workshops/Projects and Standardization Concerns in China

An Overview of PQC Workshops/Projects and Standardization Concerns in China An Overview of PQC Workshops/Projects and Standardization Concerns in China Hong Xiang, Tao Xiang Chongqing University Zheng-feng Zhang Institute of Software Chinese Academy of Sciences Zheng-fu Han University

More information

A Tale of Three CDNs

A Tale of Three CDNs A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,

More information

1 Case Studies - AppEx CDN Acceleration. Case Studies. Introduction. Case Study # 1 CDN (Content Delivery Network)

1 Case Studies - AppEx CDN Acceleration. Case Studies. Introduction. Case Study # 1 CDN (Content Delivery Network) Introduction AppEx was founded in 2007 and has focused on the CDN market for many years. We have had great success Internationally helping CDNs to improve user experiences and be competitive in the constantly

More information

Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky Kyle Schomp 2018 AKAMAI FASTER FORWARD TM

Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky Kyle Schomp 2018 AKAMAI FASTER FORWARD TM Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky Kyle Schomp Background on collaborative resolution www.example.com Recursive Resolver DNS Client 2 PAM 2018 Background

More information

Network measurement using Akamai's infrastructure. Mike P. Wittie

Network measurement using Akamai's infrastructure. Mike P. Wittie Network measurement using Akamai's infrastructure Mike P. Wittie 1 Overview Akamai has lots of servers close to users and lots of users close to servers Let s put their hands together (Of course we re

More information

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori 1, Takeru Inoue 2, Akihiro Shimoda 3, Kazumichi Sato 3, Keisuke Ishibashi 3, and Shigeki Goto

More information

Networked systems and their users

Networked systems and their users Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of

More information

Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer

Indirection. science can be solved by adding another level of indirection -- Butler Lampson. Every problem in computer Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer

More information

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution

More information

Advancing the Art of Internet Edge Outage Detection

Advancing the Art of Internet Edge Outage Detection Advancing the Art of Internet Edge Outage Detection ACM Internet Measurement Conference 2018 Philipp Richter MIT / Akamai Ramakrishna Padmanabhan University of Maryland Neil Spring University of Maryland

More information

WIth the technological advances on Web, cloud computing,

WIth the technological advances on Web, cloud computing, Understanding E-Commerce Systems under Massive Flash Crowd: Measurement, Analysis, and Implications Junqiang Ge, Student Member, IEEE, Ye Tian, Member, IEEE, Lei Liu, Rongheng Lan, and Xinming Zhang, Member,

More information

Characterization of Collaborative Resolution in Recursive DNS Resolvers

Characterization of Collaborative Resolution in Recursive DNS Resolvers Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky 1 and Kyle Schomp 2(B) 1 Case Western Reserve University, Cleveland, USA rami.al-dalky@case.edu 2 Akamai Technologies,

More information

Characterization of Collaborative Resolution in Recursive DNS Resolvers

Characterization of Collaborative Resolution in Recursive DNS Resolvers Characterization of Collaborative Resolution in Recursive DNS Resolvers Rami Al-Dalky 1 and Kyle Schomp 2 1 Case Western Reserve University 2 Akamai Technologies Abstract. Recursive resolvers in the Domain

More information

Internet. In this section: Links: Video: Did You Know - The power of the internet. Concepts > Internet

Internet. In this section: Links: Video: Did You Know - The power of the internet. Concepts > Internet Internet is the world s largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world. In this section: Internet

More information

Peering with Akamai. CaribNOG November 2015 Belize City, Belize

Peering with Akamai. CaribNOG November 2015 Belize City, Belize Peering with Akamai CaribNOG 10 04 November 2015 Belize City, Belize The Akamai Intelligent Platform Highly distributed, deeply deployed on-demand computing platform that serves any kind of web traffic

More information

Cell Spotting: Studying the Role of Cellular Networks in the Internet. John Rula. Fabián E. Bustamante Moritz Steiner 2017 AKAMAI FASTER FORWARD TM

Cell Spotting: Studying the Role of Cellular Networks in the Internet. John Rula. Fabián E. Bustamante Moritz Steiner 2017 AKAMAI FASTER FORWARD TM Cell Spotting: Studying the Role of Cellular Networks in the Internet * John Rula * Fabián E. Bustamante Moritz Steiner * 1 Understanding cellular growth is critical Growing dominance of mobile On subscriptions

More information

Predicting and Preventing Cyber Threats. Paolo Passeri, Consulting Systems Engineer

Predicting and Preventing Cyber Threats. Paolo Passeri, Consulting Systems Engineer Predicting and Preventing Cyber Threats Paolo Passeri, Consulting Systems Engineer The way we work has changed Internet Critical infrastructure Amazon, Rackspace, Windows Azure, etc. Business apps Salesforce,

More information

Understanding and Characterizing Hidden Interception of the DNS Resolution Path

Understanding and Characterizing Hidden Interception of the DNS Resolution Path Who Is Answering My Queries? Understanding and Characterizing Hidden Interception of the DNS Resolution Path Baojun Liu, Chaoyi Lu, Haixin Duan, YingLiu, ZhouLi, ShuangHaoand MinYang ISP DNS Resolver DNS

More information

Tracking Evil with Passive DNS

Tracking Evil with Passive DNS Tracking Evil with Passive DNS Bojan Ždrnja, CISSP, GCIA, GCIH Bojan.Zdrnja@infigo.hr INFIGO IS http://www.infigo.hr Who am I? Senior information security consultant with INFIGO IS (Croatia) Mainly doing

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Characterizing a Meta-CDN

Characterizing a Meta-CDN Characterizing a Meta-CDN Oliver Hohlfeld, Jan Rüth, Konrad Wolsing, http://comsys.rwth-aachen.de/ Berlin / PAM 2018 Motivation - What is a Meta-CDN? Content Delivery Networks Key component in the Internet,

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Inferring BGP Blackholing in the Internet

Inferring BGP Blackholing in the Internet Inferring BGP Blackholing in the Internet Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann, and Arthur Berger TU Berlin CAIDA MIT DE-CIX Akamai DDoS A&acks are

More information

Application Layer Traffic Optimization (ALTO)

Application Layer Traffic Optimization (ALTO) Application Layer Traffic Optimization (ALTO) Network Positioning System Stefano Previdi - sprevidi@cisco.com Distinguished Engineer Cisco Systems RIPE61 Rome, November 2010 1 Cisco NPS Introduction NPS

More information

Peering at Peerings: On the Role of IXP Route Servers

Peering at Peerings: On the Role of IXP Route Servers Peering at Peerings: On the Role of IXP Route Servers Contact: Philipp Richter (prichter@inet.tu-berlin.de) Paper: net.t-labs.tu-berlin.de/~prichter/imc238-richtera.pdf Philipp Richter TU Berlin Nikolaos

More information

Outline Applications. Central Server Hierarchical Peer-to-peer. 31-Jan-02 Ubiquitous Computing 1

Outline Applications. Central Server Hierarchical Peer-to-peer. 31-Jan-02 Ubiquitous Computing 1 Outline Applications Central Server Hierarchical Peer-to-peer 31-Jan-02 Ubiquitous Computing 1 Networked distributed system architectures Central Server based Web servers Hierarchical Services Domain Name

More information

Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs

Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs Advance Access publication on 27 February 2015 c The British Computer Society 2015. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxv015 Cost-Aware

More information

CONTENT-AWARE DNS. IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. AKAMAI DNSi CACHESERVE

CONTENT-AWARE DNS. IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. AKAMAI DNSi CACHESERVE AKAMAI DNSi CACHESERVE CONTENT-AWARE DNS IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. CacheServe is the telecommunication industry s gold standard for caching DNS.

More information

DNS Measurements at the.cn TLD Servers

DNS Measurements at the.cn TLD Servers 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery DNS Measurements at the.cn TLD Servers YUCHI Xuebiao China Internet Network Information Center, Graduate University of WANG

More information

Toward Accurate Inference of Web Activities from Passive DNS Data

Toward Accurate Inference of Web Activities from Passive DNS Data Toward Accurate Inference of Web Activities from Passive DNS Data Jingxiu Su, Zhenyu Li, Stephane Grumbach, Kave Salamatian, Chunjing Han, Gaogang Xie University of Chinese Academy of Sciences, China Institute

More information

MAPPING PEERING INTERCONNECTIONS TO A FACILITY

MAPPING PEERING INTERCONNECTIONS TO A FACILITY MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org WIE 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University

More information

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Beyond Blind Defense: Gaining Insights from Proactive App Sec Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks

More information

Chapter 2 Content Delivery Networks and Its Interplay with ISPs

Chapter 2 Content Delivery Networks and Its Interplay with ISPs Chapter 2 Content Delivery Networks and Its Interplay with ISPs This chapter surveys measurement studies on Content Delivery Networks (CDNs) in real world. Several representative CDNs with different architecture

More information

IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei

IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei IoT Security Policy and Regulation Initiatives in China Fan Dongyang, Huawei China Economy Facilitating High-quality Growth The new norm Going digital GDP Growth Rate Supply-side reform E-commerce is on

More information

Revealing the load-balancing behavior of YouTube traffic of interdomain links

Revealing the load-balancing behavior of YouTube traffic of interdomain links Revealing the load-balancing behavior of YouTube traffic of interdomain links Ricky K. P. Mok + Vaibhav Bajpai*, Amogh Dhamdhere +, kc claffy + + CAIDA/ University of California San Diego * Technical University

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

A First Look at QUIC in the Wild

A First Look at QUIC in the Wild A First Look at QUIC in the Wild Jan Rüth 1, Ingmar Poese 2, Christoph Dietzel 3, Oliver Hohlfeld 1 1 : RWTH Aachen University 2 : Benocs GmbH 3 : TU Berlin / DE-CIX http://comsys.rwth-aachen.de/ London

More information

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources

More information

COMP6218: Content Caches. Prof Leslie Carr

COMP6218: Content Caches. Prof Leslie Carr COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2

More information

List of measurements in rural area

List of measurements in rural area List of measurements in rural area Network Distance / Delay / HOP! Tool " ICMP Ping and UDP Ping (traceroute)! Targets / Tests " VSAT Gateways / Earth Station # Testing distance to VSAT FTP server at the

More information

Cloud DNS Phone: (877)

Cloud DNS Phone: (877) Cloud DNS Phone: (877) 937-4236 Email: info@cdnetworks.com CDNetworks Inc., 1500 Valley Vista Dr. Diamond Bar, CA 91765, USA Table of Content Introduction... 3 Cloud DNS Global Points of Presence...3 CDNetworks

More information

Illegitimate Source IP Addresses At Internet Exchange Points

Illegitimate Source IP Addresses At Internet Exchange Points Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin

More information

Towards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley

Towards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity

More information

Shaocheng Wang, Guojun Wu

Shaocheng Wang, Guojun Wu Ubiquitous and Mobile Computing CS 528: Characterizing Smartphone Usage Patterns from Millions of Android Users Shaocheng Wang, Guojun Wu Computer Science Dept. Worcester Polytechnic Institute (WPI) Introduction

More information

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017 Radware DefensePro DDoS Mitigation Release Notes Software Version 8.13.01 Last Updated: December, 2017 2017 Cisco Radware. All rights reserved. This document is Cisco Public. Page 1 of 9 TABLE OF CONTENTS

More information

Joint Server Selection and Routing for Geo-Replicated Services

Joint Server Selection and Routing for Geo-Replicated Services Joint Server Selection and Routing for Geo-Replicated Services Srinivas Narayana Joe Wenjie Jiang, Jennifer Rexford and Mung Chiang Princeton University 1 Large-scale online services Search, shopping,

More information

Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao

Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao Title: Moving Beyond End-to-End Path Information to Optimize CDN Performance Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao

More information

Improving Content Delivery Using Provider-aided Distance Information

Improving Content Delivery Using Provider-aided Distance Information Improving Content Delivery Using Provider-aided Distance Information Ingmar Poese T-Labs/TU Berlin ingmar@net.t-labs.tu-berlin.de Benjamin Frank T-Labs/TU Berlin bfrank@net.t-labs.tu-berlin.de Georgios

More information

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015 2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING

More information

Routing optimisation without BGP

Routing optimisation without BGP Routing optimisation without BGP working with Akamai to improve HTTP(S) traffic flows Thomas Mangin IXManchester 19th of April 2017 Thank you to Ronan Mullally from Akamai Technologies for his help The

More information

Anatomy of a Large European IXP

Anatomy of a Large European IXP Anatomy of a Large European IXP Nikos Chatzis Nadi Sarrar TU Berlin/T-Labs Anja Feldmann TU Berlin/T-Labs Bernhard Ager ETH Zürich Steve Uhlig Queen Mary University of London Walter Willinger AT&T Labs

More information

Alberto Dainotti

Alberto Dainotti HI-Cube / HI 3 Hub for Internet Incidents Investigation Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego LARGE-SCALE INCIDENTS a threat to

More information

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution

More information

Subscriber Data Correlation

Subscriber Data Correlation Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service

More information

Using Trustwave SEG Cloud with Exchange Online

Using Trustwave SEG Cloud with Exchange Online .trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave

More information

Testing & Assuring Mobile End User Experience Before Production Neotys

Testing & Assuring Mobile End User Experience Before Production Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Henrik Rexed Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At

More information

No domain left behind

No domain left behind No domain left behind is Let s Encrypt democratizing encryption? M Aertsen 1, M Korzyński 2, G Moura 3 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands

More information

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise

More information

On the Prevalence and Characteristics of MPLS Deployments in the Open Internet

On the Prevalence and Characteristics of MPLS Deployments in the Open Internet On the Prevalence and Characteristics of MPLS Deployments in the Open Internet Joel Sommers Colgate University Brian Eriksson Boston University Paul Barford University of Wisconsin The elephant in the

More information

Cloud DNS. High Performance under any traffic conditions from anywhere in the world. Reliable. Performance

Cloud DNS. High Performance under any traffic conditions from anywhere in the world. Reliable. Performance Cloud DNS High Performance under any traffic conditions from anywhere in the world Secure DNS System Reduce vulnerability to spoofing and distributed denial of service (DDoS) attacks Reliable Performance

More information

OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements. Design and Analysis of Communication Systems

OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements. Design and Analysis of Communication Systems OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements DACS Design and Analysis of Communication Systems Why measure DNS? (Almost) every networked service relies

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet datacenters Introduction Internet datacenters:

More information

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business

More information

Alibaba Cloud CDN. FAQs

Alibaba Cloud CDN. FAQs Alibaba Cloud CDN FAQs FAQs Product Strengths Alibaba Cloud CDN Product Strengths Stable and Fast - Advanced distributed system architecture, node reserves:around 500 nodes in China and over 30 abroad

More information

IPv6 Development in China

IPv6 Development in China 2010/TEL41/DSG/WKSP2/011 Agenda Item: Panel Discussion 2 IPv6 Development in China Submitted by: China Workshop for IPv6: Transforming the Internet Chinese Taipei 8 May 2010 IPv6 development in China Zhicheng

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 12: Distributed -Based Systems Version: December 10, 2012 Distributed -Based Systems

More information

Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion

Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion wissenschaftliche Aussprache 2. August 2017 Philipp Richter Internet Penetration, 2017, ISOC. The Internet connects 3.5 billion

More information

Cloud Load Balancer CDNetworks Inc. All rights reserved.

Cloud Load Balancer CDNetworks Inc. All rights reserved. Cloud Load Balancer Phone: (877) 937-4236 Email: info@cdnetworks.com 2019 CDNetworks Inc. All rights reserved. Table of Content DNS-based Global Load Balancing... 3 Key Features and Benefits... 4 POP Map...

More information

SolarWinds Orion Platform Scalability

SolarWinds Orion Platform Scalability TECH TIPS SolarWinds Orion Platform Scalability SolarWinds provides enterprise-class infrastructure management software designed to help manage and monitor data centers and IT infrastructure. With products

More information

Protecting DNS from Routing Attacks -Two Alternative Anycast Implementations

Protecting DNS from Routing Attacks -Two Alternative Anycast Implementations Protecting DNS from Routing Attacks -Two Alternative Anycast Implementations Boran Qian StudentID 317715 Abstract The Domain Names System (DNS) is an important role of internet infrastructure and supporting

More information

Update on TLS SNI and IPv6 client adoption

Update on TLS SNI and IPv6 client adoption Update on TLS SNI and IPv6 client adoption IETF 101 London - MAPRG March 20, 2018 Presenter: Erik Nygren, HTTPS Growth Motivation HTTPS is growing rapidly but no IP multi-tenancy without

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

The Collateral Damage of Internet Censorship by DNS Injection

The Collateral Damage of Internet Censorship by DNS Injection The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1 Basic Summary Great Firewall of China injects DNS responses to restrict access

More information

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet Boosting Agility & Performance on the Evolving Internet To improve customers web and mobile experiences, organizations must address

More information

Measuring Privacy Threats in China-Wide Mobile Networks

Measuring Privacy Threats in China-Wide Mobile Networks Measuring Privacy Threats in China-Wide Mobile Networks Mingming Zhang 1, Baojun Liu 1, Chaoyi Lu 1, Jia Zhang 1, Shuang Hao 2 and Haixin Duan 1 1 Tsinghua University, 2 University of Texas at Dallas 1

More information

Chinese Server Market Development and Major Brand Analysis

Chinese Server Market Development and Major Brand Analysis Industry Intelligence Program Computing Chinese Server Market Development and Major Brand Analysis Abstract Taking advantage of the rise of cloud and mobile computing, the server industry has been booming

More information

A Multi-Perspective Analysis of Carrier-Grade NAT Deployment

A Multi-Perspective Analysis of Carrier-Grade NAT Deployment A Multi-Perspective Analysis of Carrier-Grade NAT Deployment Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, and

More information

Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform. PREPARED FOR EdgeConneX

Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform. PREPARED FOR EdgeConneX Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform PREPARED FOR EdgeConneX Contents 1 EXECUTIVE SUMMARY 3 1.1 About EdgeConneX 3 1.2 About SamKnows 4 2 INTRODUCTION 5 2.1

More information

THE UTILITY OF DNS TRAFFIC MANAGEMENT

THE UTILITY OF DNS TRAFFIC MANAGEMENT SECURITY SERVICES WHITE PAPER THE UTILITY OF DNS TRAFFIC MANAGEMENT TABLE OF CONTENTS 2 ABOUT DNS 3 DNS TRAFFIC MANAGEMENT 4 MONITORING AND FAILOVER 5 TRAFFIC MANAGEMENT MONITORING PROBES 6 GLOBAL LOAD

More information

Internet exchange Federation Project Funding Proposal

Internet exchange Federation Project Funding Proposal Internet exchange Federation Project Funding Proposal The Internet exchange Point Database (IXPDB) Executive Summary Internet Exchange Points (IXPs) are network facilities that enable the interconnection

More information

Cisco Unified Customer Voice Portal

Cisco Unified Customer Voice Portal This chapter explains the procedures you must perform to configure the Cisco Unified CVP Call and OAMP servers on Side A and Side B. Validate Network Card, page 2 Configure Unified CVP Call Server, page

More information

Comodo cwatch Web Security Software Version 1.6

Comodo cwatch Web Security Software Version 1.6 rat Comodo cwatch Web Security Software Version 1.6 Quick Start Guide Guide Version 1.6.010918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo cwatch Web Security - Quick Start Guide

More information

MAPPING PEERING INTERCONNECTIONS TO A FACILITY

MAPPING PEERING INTERCONNECTIONS TO A FACILITY MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org CoNEXT 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Performance and Scalability of Networks, Systems, and Services

Performance and Scalability of Networks, Systems, and Services Performance and Scalability of Networks, Systems, and Services Niklas Carlsson Linkoping University, Sweden Student presentation @LiU, Sweden, Oct. 10, 2012 Primary collaborators: Derek Eager (University

More information